-----BEGIN PRIVACY-ENHANCED MESSAGE-----
Proc-Type: 4,MIC-CLEAR
Content-Domain: RFC822
Originator-Certificate: MIICozCCAgwCAREwDQYJKoZIhvcNAQECBQAwgYYxC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Issuer-Certificate: MIICNTCCAZ4CASIwDQYJKoZIhvcNAQECBQAwRDELMAkGA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Issuer-Certificate: MIIB8jCCAVsCAQEwDQYJKoZIhvcNAQECBQAwRDELMAkGA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MIC-Info: RSA-MD5,RSA,FSvbJFVdr7fFPzdv+ArwE7OeFVlyH9/T02R40/GtkLD
PryZq3BtsEdEEfqxkGeHWpG22/LQzpOEMG7bWiTJsBOURD19n5ZRyeUYfb0sRmyh
c3b824KEepytVD/shAYLve2sjZs7Lfv58aK/Tl9Qvo69h4CUsH9D2At1xJBYczPs
=
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Automated Systems Security Incident Support Team
_____
___ ___ _____ ___ _____ | /
/\ / \ / \ | / \ | | / Integritas
/ \ \___ \___ | \___ | | < et
/____\ \ \ | \ | | \ Celeritas
/ \ \___/ \___/ __|__ \___/ | |_____\
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Bulletin 94-16
Release date: 9 May 1994, 7:15 AM EDT
SUBJECT: Vulnerability in Solaris 2.3 "automountd".
SUMMARY: Sun Microsystems has released a patch which will fix a
vulnerability that exists in Solaris 2.3 automountd.
BACKGROUND: Patch 101329-15 fixes a bug in the Solaris 2.3 version
of automountd which allows a user with an unprivileged account on
a 2.3 system to gain root access. The automountd fix is bundled
into the Solaris 2.3 jumbo NIS+ patch, the most current version of
which is 101329-15. This bug is not found in any other SunOS
version, including Solaris x86. The fix has been integrated into
the upcoming Solaris 2.4 release. Sun patches can be obtained
from Local Sun answer centers worldwide, SunSolve Online, and
via anonymous ftp from the ftp.uu.net /systems/sun/sun-dist and
ftp.eu.net ~ftp/sun/fixes directories.
IMPACT: Unauthorized users can obtain root access.
RECOMMENDED SOLUTION: Obtain and install the 101329-15 patch on
all affected Solaris 2.3 systems. The following is checksum
information for the patch:
File BSD SVR4
Name Checksum Checksum
- --------------- --------- ----------
101329-15.tar.Z 55492 843 46189 1685
MD5
Digital Signature
--------------------------------
19AA042484727A5DE9CB21199858071A
The checksums shown above are from the BSD-based checksum
(on 4.1.x, /bin/sum; on Solaris 2.x, /usr/ucb/sum) and from
the SVR4 version on Solaris 2.x (/usr/bin/sum).
ASSIST is an element of the Defense Information Systems Agency
(DISA), Center for Information Systems Security (CISS), that
provides service to the entire DoD community. If you are a
constituent of the DoD and have any questions about ASSIST or
computer security issues, contact ASSIST using one of the methods
listed below. If your organization/institution is non-DoD,
contact your Forum of Incident Response and Security Teams
(FIRST) representative. You can obtain a list of FIRST member
organizations and their constituencies by sending email to
docserver@first.org with an empty "subject" line and a message body
containing the line "send first-contacts".
ASSIST INFORMATION RESOURCES: If you would like to be included in
the distribution list for these bulletins, send your Milnet
(Internet) e-mail address to assist-request@assist.ims.disa.mil.
Back issues of ASSIST bulletins, and other security related
information, are available from the ASSIST BBS at 703-756-7993/
1154 DSN 289, and through anonymous FTP from assist.ims.disa.mil
(IP address 137.130.234.30). Note: assist.ims.disa.mil will only
accept anonymous FTP connections from Milnet addresses that are
registered with the NIC or DNS.
ASSIST contact information:
PHONE: 703-756-7974, DSN 289, duty hours are 06:00 to 22:30 EST
Monday through Friday. During off duty hours, weekends, and
holidays, ASSIST can be reached via pager at 800-SKY-PAGE
(800-759-7243) PIN 2133937. Your page will be answered within 30
minutes, however if a quicker response is required, prefix
your phone number with "999".
ELECTRONIC MAIL: Send to assist@assist.ims.disa.mil.
ASSIST BBS: Leave a message for the "sysop".
Privacy Enhanced Mail (PEM): ASSIST uses PEM, a public key
encryption tool, to digitally sign all bulletins that are
distributed through e-mail. The section of seemingly random
characters between the "BEGIN PRIVACY-ENHANCED MESSAGE" and
"BEGIN ASSIST BULLETIN" contains machine-readable digital
signature information generated by PEM, not corrupted data. PEM
software for UNIX systems is available from Trusted Information
Systems (TIS) at no cost, and can be obtained via anonymous FTP
from ftp.tis.com (IP 192.94.214.100). Note: The TIS software is
just one of several implementations of PEM currently available and
additional versions are likely to be offered from other
sources in the near future.
Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does
not constitute or imply its endorsement, recommendation, or
favoring by ASSIST. The views and opinions of authors expressed
herein shall not be used for adverstising or product endorsement
purposes.
-----END PRIVACY-ENHANCED MESSAGE-----